<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>DDC4002e — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ddc4002e/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 16:15:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ddc4002e/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kieback &amp; Peter DDC Building Controllers Cross-Site Scripting Vulnerability (CVE-2026-4293)</title><link>https://feed.craftedsignal.io/briefs/2026-05-kieback-peter-xss/</link><pubDate>Tue, 19 May 2026 16:15:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-kieback-peter-xss/</guid><description>A cross-site scripting vulnerability, CVE-2026-4293, exists in multiple Kieback &amp; Peter DDC Building Controllers that could allow an attacker to take control of the victim's browser.</description><content:encoded><![CDATA[<p>A cross-site scripting (XSS) vulnerability, identified as CVE-2026-4293, affects multiple versions of Kieback &amp; Peter DDC Building Controllers. Specifically, versions DDC4002, DDC4100, DDC4200, DDC4200-L, and DDC4400, all at or below version 1.12.14, as well as DDC4002e, DDC4200e, DDC4400e, DDC4020e, and DDC4040e, all at or below version 1.23.4, and DDC520 at or below version 1.24.1 are vulnerable. Successful exploitation could allow an attacker to execute arbitrary JavaScript code in the victim&rsquo;s browser, potentially leading to session hijacking, defacement, or redirection to malicious websites. These building controllers are deployed across critical infrastructure sectors including commercial facilities, communications, financial services, food and agriculture, government services and facilities, healthcare, and information technology across Austria, China, France, Germany, and the United Arab Emirates.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Kieback &amp; Peter DDC Building Controller web interface accessible on the network.</li>
<li>Attacker crafts a malicious URL containing a cross-site scripting payload. The payload is designed to execute arbitrary JavaScript within the context of the user&rsquo;s browser.</li>
<li>The attacker uses social engineering to trick an authorized user into clicking the malicious link or visiting a compromised webpage embedding the malicious URL.</li>
<li>The victim&rsquo;s browser sends a request to the vulnerable DDC Building Controller web interface.</li>
<li>The DDC Building Controller fails to properly sanitize user-supplied input, and the malicious JavaScript payload is reflected back to the user&rsquo;s browser.</li>
<li>The victim&rsquo;s browser executes the attacker&rsquo;s JavaScript code.</li>
<li>The malicious JavaScript code steals the user&rsquo;s session cookies or credentials.</li>
<li>The attacker uses the stolen session cookies or credentials to gain unauthorized access to the DDC Building Controller web interface and manipulate building control systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the XSS vulnerability (CVE-2026-4293) in Kieback &amp; Peter DDC Building Controllers allows an attacker to control the victim&rsquo;s browser. This could lead to unauthorized access to building control systems, manipulation of environmental controls (e.g., HVAC, lighting), denial of service, or further lateral movement within the affected network. Given the controllers&rsquo; deployment in critical infrastructure sectors, the potential impact includes disruption of essential services, financial losses, and physical safety risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates to the latest versions to patch CVE-2026-4293: DDC4002e, DDC4200e, DDC4400e, DDC4020e, DDC4040e to version 1.23.5 or newer, and DDC520 to version 1.24.2 or newer.</li>
<li>For end-of-maintenance DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 controllers, isolate them within a strictly separate OT network, and restrict network access to the DDC web portal to trusted individuals. Disable the web portal if not required, as recommended by the vendor.</li>
<li>Implement network segmentation and firewall rules to minimize network exposure of control system devices, as mentioned in the vendor mitigation guidance.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-4293 Exploitation Attempt via URI Parameter&rdquo; to identify potential exploitation attempts against the vulnerable web interfaces.</li>
<li>Educate users about the risks of clicking links from untrusted sources to prevent social engineering attacks that could lead to exploitation, as recommended by the vendor.</li>
<li>Monitor web server logs for suspicious activity, such as unusual URI requests or patterns indicative of XSS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>vulnerability</category><category>building-automation</category></item></channel></rss>